SEARCH RESULTS

YOU WERE LOOKING FOR :Information Technology Business Solutions

Essays 301 - 330

DEC Compaq Merger and Information Technology Integration

had occurred during the meetings. The two companies were very different in their approach to business. They sought to comp...

Risk Management, Security, and Communication

to inappropriate individuals or departments. This can perhaps best be illustrated by looking at the use of IT within a corporate s...

Steinway's Supply Chain

chain, they are firm infrastructure, human resource management, technological development and procurement (Porter, 1985). At all l...

Identity Theft Protection

loaded onto his computer and being spied on for a short time by coworkers. Jackson (2001) was able not only to gain access...

Overview of IT Project Process Stages

and also who it is that will be using the system and who it is that this use will impact on, for example, in a hospital this will ...

Making Management Decisions and IS Technology

a component of DSS has led to the development of a general framework for the integration of both DSS and software agents. These r...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

MALCOLM AND UCB: A COMPARISON

of their operations and activities. The two aspects that are considered with the Baldrige National Award, especially as they perta...

FROM HERE TO ECONOMY - AN ANALYSIS

the guts to call Adam Smith, the so-called father of economics "not the brightest light in the galaxy?" Or who would consider John...

Information Technology Projects

change. One dynamic that is often overlooked in IT change projects is the loss of productivity during and immediately after the ...

Current Events in Auditing Information Technology

(The Institute of Internal Auditors, 2009a). Auditing problems revolving around extensible business reporting terminology will be...

Technology is Not Neutral

think we "fit" the services they offer. While this may be merely annoying when it comes to dealing with the junk mail, both snail ...

Questions on Information Technology Acquisition Answered

the company (Strategic Management, 2004). This alignment will mean that the planning of these smaller issues should be seen as par...

Questions on Information Technology Acquisitions

should not conflict, and may also help to achieve the goals. The way the project is planned and undertaken will need consider othe...

Implications of the Sarbanes-Oxley Act

of the marketplace by big business (Bittlingmayer, 2002). Catanzaro (2000) accuses President Richard Nixon of using antitrust law ...

Exeter University, Information Technology Planning and Future Upgrading

short-staffed and were woefully short on funds. Other features of the means by which one of Exeters systems was automated a...

Wage Inequalities and Information Technology Offshoring Sources

should discount rhetoric that they can easily affect the number or quality of new jobs. Many readers were appalled by the message....

Ethics In Information Technology

16). Monitoring and surveillance have come to represent just two of the villainous components of computer use in the late twentie...

New Dawn Drilling Case Study

that are used. The information is accumulated locally, put into Excel spread sheets and sent to the head office where it is input ...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Characteristics Successful IT Manager

* Adopt a client service mindset so that the focus is always on what the client or customer needs and expects (Sisco, 2003). * Abi...

Information Technology Lessons, Student Performance, and Gender Differences

the division and difference that may exist within the classroom whether or not the digital divide has been overcome. One major d...

Information and Communications Technology Interview and Interpretation

a predicable change as may be expected if we were to apply the theories of Clark (et al, 1988). In terms of identify there are m...

Information Technology and Current Issues

meaning is larger than this Henderson (2002), describes this as the difference between the information literate and the informatio...

Competitive Advantage and Technology

and Millar (1985) noted some 20 years ago that information technology ends up creating a competitive advantage by offering the bus...

Managerial Impact of Developments in Information Technology

that outsourced some of their IT needs, Kodak and British Petroleum Exploration (BPX), because the management structures were very...

Dissertation Proposal on the Commercial Value of IT

measure this value rather than the use of the traditional productivity measures. This can then be expanded into the way value meas...

Information Technology Policy Development

transactions, worth more than $1 trillion, in the 12 months ended March 30, the first time it has passed the $1 trillion mark in a...

Information Technology Portfolio Management

management is that it minimizes the risk associated with any available choice of action. The risk that exists arises from uncerta...

Case Study of Eastern Power Company

allowing bill payment online as well as facilitating complaints or communication with customer services by e-mail. However, these ...